Digital Library


Search: "[ keyword: Intrusion Detection System ]" (10)
    , , , , , Vol. 32, No. 6, pp. 1171-1181, Dec. 2022
    10.13089/JKIISC.2022.32.6.1099

    , , Vol. 31, No. 3, pp. 373-385, Jun. 2021
    10.13089/JKIISC.2021.31.3.373

    Machine Learning Based Intrusion Detection Systems for Class Imbalanced Datasets
    Yun-Gyung Cheong, Kinam Park, Hyunjoo Kim, Jonghyun Kim, Sangwon Hyun, Vol. 27, No. 6, pp. 1385-1395, Dec. 2017
    10.13089/JKIISC.2017.27.6.
    Keywords: Intrusion Detection System, Machine Learning, Imbalanced Dataset

    Malicious Code Detection using the Effective Preprocessing Method Based on Native API
    Seong-Jae Bae, Jae-Ik Cho, Tae-Shik Shon, Jong-Sub Moon, Vol. 22, No. 4, pp. 785-796, Aug. 2012
    10.13089/JKIISC.2012.22.4.785
    Keywords: Malicious Code, Intrusion Detection System, GLDA

    A New Method to Detect Anomalous State of Network using Information of Clusters
    Ho-Sub Lee, Eung-Ki Park, Jung-Taek Seo, Vol. 22, No. 3, pp. 545-552, Jun. 2012
    10.13089/JKIISC.2012.22.3.545
    Keywords: Intrusion Detection System, Machine Learning, clustering

    Specification-based Intrusion Detection System for WIPI
    Ik-Jae Kim, Soo-Jin Lee, Vol. 17, No. 6, pp. 41-56, Dec. 2007
    10.13089/JKIISC.2007.17.6.41
    Keywords: WIPI, Intrusion Detection System(IDS), HAL, mIDS, Mobile, Handset Device

    Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction
    Mi-Sun Kim, Kyung-Woo Park, Jae-Hyun Seo, Vol. 16, No. 6, pp. 111-122, Dec. 2006
    10.13089/JKIISC.2006.16.6.111
    Keywords: Intrusion Detection System, False-positive, association rule mining, Negative Selection Algorithm, Anomaly Detection

    A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System
    Son Hyung-Seo, Kim Hyun-Sung, Bu Ki-Dong, Vol. 14, No. 6, pp. 3-14, Dec. 2004
    10.13089/JKIISC.2004.14.6.3
    Keywords: Intrusion Detection System, Rule Protection Mechanism, Symmetric Cryptosystem

    Anomaly Detection Method Based on The False-Positive Control
    , , , , Vol. 13, No. 4, pp. 151-160, Aug. 2003
    10.13089/JKIISC.2003.13.4.151
    Keywords: 침입 탐지 시스템, 과탐지, 프로파일링, 연관규칙 탐사, 군집화, Intrusion Detection System, False-positive, Profiling, association rule mining, clustering

    Design of Intrusion Detection System using System Call Trace of Privilege Process : Immune System Approach
    , Vol. 10, No. 1, pp. 39-52, Feb. 2000
    10.13089/JKIISC.2000.10.1.39
    Keywords: computer security, Intrusion Detection System, system call, audit data, immune system